67,201 research outputs found

    Secure JPEG Scrambling enabling Privacy in Photo Sharing

    Get PDF
    With the popularization of online social networks (OSNs) and smart mobile devices, photo sharing is becoming a part of people’ daily life. An unprecedented number of photos are being uploaded and shared everyday through online social networks or photo hosting services, such as Facebook, Twitter, Instagram, and Flickr. However, such unrestrained online photo or multimedia sharing has raised serious privacy concerns, especially after reports of citizens surveillance by governmental agencies and scandalous leakage of private photos from prominent photo sharing sites or online cloud services. Popular OSNs typically offer privacy protection solutions only in response to the public demand and therefore are often rudimental, complex to use, and provide limited degree of control and protection. Most solutions allow users to control either who can access the shared photos or for how long they can be accessed. In contrast, in this paper, we take a structured privacy by design approach to the problem of online photo privacy protection. We propose a privacy-preserving photo sharing architecture based on a secure JPEG scrambling algorithm capable of protecting the privacy of multiple users involved in a photo. We demonstrate the proposed photo sharing architecture with a prototype application called ProShare that offers JPEG scrambling as the privacy protection tool for selected regions in a photo, secure access to the protected images, and secure photo sharing on Facebook

    Privacy-Preserving Photo Sharing based on a Secure JPEG

    Get PDF
    Sharing photos online is a common activity on social networks and photo hosting platforms, such as Facebook, Pinterest, Instagram, or Flickr. However, after reports of citizens surveillance by governmental agencies and the scandalous leakage of celebrities private photos online, people have become concerned about their online privacy and are looking for ways to protect it. Popular social networks typically offer privacy protection solutions only in response to the public demand and therefore are often rudimental, complex to use, and provide limited degree of control and protection. Most solutions either allow users to control who can access the shared photos or for how long they can be accessed. In contrast, in this paper, we take a structured privacy by design approach to the problem of online photo privacy protection. We propose a privacy-preserving photo sharing architecture that takes into account content and context of a photo with privacy protection integrated inside the JPEG file itself in a secure way. We demonstrate the proposed architecture with a prototype mobile iOS application called ProShare that offers scrambling as the privacy protection tool for a selected region in a photo, secure access to the protected images, and secure photo sharing on Facebook

    Photo Sharing and Privacy Control Decisions

    Get PDF
    Photo sharing is a tempting module which enhances Online Social Networks. Unfortunately, there are several security crises. All are permitted to post, comment and tag the other users. The misuse of photos can happen. We study the situation when a client shares a photograph containing people other than her (termed co-photograph for short). We need to minimize the security breaches that happen during uploading/posting the photos of people without the knowledge of people involved in photo i.e. Co-owners. As a solution for this we need a facial acknowledgement face recognition framework that can identify each user involved in the photograph. Online social network provides the attractive means of sharing information but do not provide any privacy or security policies to restrict the access to shared information. So proposed an approach to enable the security of shared information associated with multiple users in online social networks. For this concern we proposed an access control model to capture intrinsic nature of the multiparty authorization requirement along with the privacy specification scheme and a policy enforcement mechanism. We validate that our framework is better than other conceivable approaches as far as acknowledgment proportion and effectiveness. Our mechanism is executed as a proof based on prototype of Facebook's stage. Proposed application will not infect to true users and get polluted by unauthorized users and their posting the photos in unsecure way. Hence proposed social application will be secure and safest as it enforces security to shared information

    JPEG privacy and security framework for social networking and GLAM services

    Get PDF
    Current image coding standards provide limited support for privacy and security features. An exception is the JPSEC standard, which defines security extensions in JPEG 2000 specifications (part 8). Notwithstanding this shortcoming, the JPEG committee is currently defining a new JPEG Systems standard, which envisages privacy and security support across JPEG family of standards. In this manuscript, the main philosophy of this emerging specification is outlined along with typical use cases, main requirements as well as examples of potential technological solutions. The upcoming specification guarantees backward and forward compatibility with earlier standards and legacy implementations. Finally, we illustrate the introduced framework by two applications targeting secure photo sharing on social networks and IPR management in the GLAM sector.Peer ReviewedPostprint (published version

    The Digital Difference of Online Social Networking in the Carribean

    Get PDF
    Users of online social networking sites have made significant advances in the development of global virtual communities. With their origins in listservs, egroups, blogs, chat rooms and instant messaging, social networking sites provide opportunities for users with required skills, to construct public or semi-public profiles, to interact with ???friends??? and colleagues across the globe and to collaboratively create social capital. The presentation will focus on the impact of social networking on the Caribbean. It will examine participation of Caribbean people, including candidates in recent general elections held in 2007 and 2008, in popular social networking sites, such as Facebook, MySpace and YouTube. The assessment will cover factors influencing membership and participation, conditions under which content is created and information shared, as well as issues of privacy and protection. In recognition of the successes of these sites in facilitating interaction among large geographically dispersed groups of users, sharing content, collaborating with peers, and linking communities, the presentation will also examine and assess the role of information literacy the activities of library social networking sites, and their contribution to the development of interactive information resources in the social sciences.International Federation of Library AssociationsUniversity of Toronto, LibraryUniversity of Toronto, Faculty of InformationUniversity of Illinois, LibraryTitle VI National Resource Center Grant (P015A060066)unpublishednot peer reviewe

    Secure Identification in Social Wireless Networks

    Get PDF
    The applications based on social networking have brought revolution towards social life and are continuously gaining popularity among the Internet users. Due to the advanced computational resources offered by the innovative hardware and nominal subscriber charges of network operators, most of the online social networks are transforming into the mobile domain by offering exciting applications and games exclusively designed for users on the go. Moreover, the mobile devices are considered more personal as compared to their desktop rivals, so there is a tendency among the mobile users to store sensitive data like contacts, passwords, bank account details, updated calendar entries with key dates and personal notes on their devices. The Project Social Wireless Network Secure Identification (SWIN) is carried out at Swedish Institute of Computer Science (SICS) to explore the practicality of providing the secure mobile social networking portal with advanced security features to tackle potential security threats by extending the existing methods with more innovative security technologies. In addition to the extensive background study and the determination of marketable use-cases with their corresponding security requirements, this thesis proposes a secure identification design to satisfy the security dimensions for both online and offline peers. We have implemented an initial prototype using PHP Socket and OpenSSL library to simulate the secure identification procedure based on the proposed design. The design is in compliance with 3GPP‟s Generic Authentication Architecture (GAA) and our implementation has demonstrated the flexibility of the solution to be applied independently for the applications requiring secure identification. Finally, the thesis provides strong foundation for the advanced implementation on mobile platform in future

    Secure Mobile Social Networks using USIM in a Closed Environment

    Get PDF
    Online social networking and corresponding mobile based applications are gaining popularity and now considered a well-integrated service within mobile devices. Basic security mechanisms normally based on passwords for the authentication of social-network users are widely deployed and poses a threat for the user security. In particular, for dedicated social groups with high confidentiality and privacy demands, stronger and user friendly principles for the authentication and identification of group members are needed. On the other hand, most of the mobile units already provide strong authentication procedures through the USIM/ISIM module. This paper explores how to build an architectural framework for secure enrollment and identification of group members in dedicated closed social groups using the USIM/SIM authentication and in particular, the 3GPP Generic Authentication Architecture (GAA), which is built upon the USIM/SIM capabilities. One part of the research is to identify the marketable use-cases with corresponding security challenges to fulfill the requirements that extend beyond the online connectivity. This paper proposes a secure identification design to satisfy the security dimensions for both online and offline peers. We have also implemented an initial proof of the concept prototype to simulate the secure identification procedure based on the proposed design. Our implementation has demonstrated the flexibility of the solution to be applied independently for applications requiring secure identification
    • …
    corecore